Merge pull request #92 from grafana/use_secret_for_minio

Use a secret for the Minio access
This commit is contained in:
Michel Hollands 2024-05-07 12:37:07 +01:00 committed by GitHub
commit 56cab04af8
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 80 additions and 26 deletions

View File

@ -49,6 +49,9 @@ spec:
- containerPort: 7946 - containerPort: 7946
name: memberlist name: memberlist
protocol: TCP protocol: TCP
envFrom:
- secretRef:
name: mmc-minio
readinessProbe: readinessProbe:
failureThreshold: 3 failureThreshold: 3
httpGet: httpGet:

View File

@ -229,9 +229,9 @@ loki:
common: common:
storage: storage:
s3: s3:
access_key_id: "{{ .Values.global.minio.rootUser }}" access_key_id: "${rootUser}"
endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000" endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000"
secret_access_key: "{{ .Values.global.minio.rootPassword }}" secret_access_key: "${rootPassword}"
compactor: compactor:
retention_enabled: true retention_enabled: true
delete_request_store: s3 delete_request_store: s3
@ -254,8 +254,24 @@ loki:
installOperator: false installOperator: false
lokiCanary: lokiCanary:
enabled: false enabled: false
test: write:
enabled: false extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
read:
extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
backend:
extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
alloy: alloy:
alloy: alloy:
@ -292,30 +308,31 @@ alloy:
mimir-distributed: mimir-distributed:
minio: minio:
enabled: false enabled: false
global:
extraEnvFrom:
- secretRef:
name: "mmc-minio"
mimir: mimir:
structuredConfig: structuredConfig:
alertmanager_storage: alertmanager_storage:
s3: s3:
bucket_name: mimir-ruler bucket_name: mimir-ruler
access_key_id: "{{ .Values.global.minio.rootUser }}"
endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000"
secret_access_key: "{{ .Values.global.minio.rootPassword }}"
insecure: true
blocks_storage: blocks_storage:
backend: s3 backend: s3
s3: s3:
bucket_name: mimir-tsdb bucket_name: mimir-tsdb
access_key_id: "{{ .Values.global.minio.rootUser }}"
endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000"
secret_access_key: "{{ .Values.global.minio.rootPassword }}"
insecure: true
ruler_storage: ruler_storage:
s3: s3:
bucket_name: mimir-ruler bucket_name: mimir-ruler
access_key_id: "{{ .Values.global.minio.rootUser }}" common:
endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000" storage:
secret_access_key: "{{ .Values.global.minio.rootPassword }}" backend: s3
insecure: true s3:
bucket_name: mimir-ruler
access_key_id: "${rootUser}"
endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000"
secret_access_key: "${rootPassword}"
insecure: true
limits: limits:
compactor_blocks_retention_period: 30d compactor_blocks_retention_period: 30d
@ -328,12 +345,39 @@ tempo-distributed:
s3: s3:
bucket: tempo bucket: tempo
endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000" endpoint: "{{ .Release.Name }}-minio.{{ .Release.Namespace }}.svc:9000"
access_key: "{{ .Values.global.minio.rootUser }}" access_key: "${rootUser}"
secret_key: "{{ .Values.global.minio.rootPassword }}" secret_key: "${rootPassword}"
insecure: true insecure: true
compactor: distributor:
compaction: extraArgs:
block_retention: 30d - "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
ingester:
extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
compactor:
extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
querier:
extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
queryFrontend:
extraArgs:
- "-config.expand-env=true"
extraEnvFrom:
- secretRef:
name: "mmc-minio"
traces: traces:
otlp: otlp:
http: http:
@ -342,8 +386,7 @@ tempo-distributed:
enabled: true enabled: true
minio: minio:
rootUser: rootuser existingSecret: "minio"
rootPassword: rootpassword
buckets: buckets:
- name: loki-chunks - name: loki-chunks
policy: none policy: none

View File

@ -25,17 +25,17 @@
``` ```
kubectl create secret generic logs -n meta \ kubectl create secret generic logs -n meta \
--from-literal=username=<logs username> \ --from-literal=username=<logs username> \
--from-literal=password=<token> --from-literal=password=<token> \
--from-literal=endpoint='https://logs-prod-us-central1.grafana.net/loki/api/v1/push' --from-literal=endpoint='https://logs-prod-us-central1.grafana.net/loki/api/v1/push'
kubectl create secret generic metrics -n meta \ kubectl create secret generic metrics -n meta \
--from-literal=username=<metrics username> \ --from-literal=username=<metrics username> \
--from-literal=password=<token> --from-literal=password=<token> \
--from-literal=endpoint='https://prometheus-us-central1.grafana.net/api/prom/push' --from-literal=endpoint='https://prometheus-us-central1.grafana.net/api/prom/push'
kubectl create secret generic traces -n meta \ kubectl create secret generic traces -n meta \
--from-literal=username=<OTLP instance ID> \ --from-literal=username=<OTLP instance ID> \
--from-literal=password=<token> --from-literal=password=<token> \
--from-literal=endpoint='https://otlp-gateway-prod-us-east-0.grafana.net/otlp' --from-literal=endpoint='https://otlp-gateway-prod-us-east-0.grafana.net/otlp'
``` ```
@ -67,6 +67,14 @@
kubectl create namespace meta kubectl create namespace meta
``` ```
1. Create a secret with the user and password for the local Minio:
```
kubectl create secret generic minio -n meta \
--from-literal=rootPassword=<password> \
--from-literal=rootUser=<user>
```
1. Create a values.yaml file based on the [default one](../charts/meta-monitoring/values.yaml). An example minimal values.yaml looks like this: 1. Create a values.yaml file based on the [default one](../charts/meta-monitoring/values.yaml). An example minimal values.yaml looks like this:
``` ```